Professional Documents
Culture Documents
the safety of valuable information and data of every student and faculties in
the institution
CHAPTER I
The problem and its background
INRODUCTION
Educational institution in developing countries is a vast sector and it is expanding rapidly.
With the rapid growth of technologies, educational institutions are still lagging behind. For
identification of the students, faculties, and employees in a company they still lie on manual
handwritten ID card and files. If proper ID card system is introduced, then it would be much
easier to identify and can track his/her progress. Therefore, in this research we implemented
advanced using of QR code ID generation. We tried level best to make right implementation of
QR code ID card. Automated ID had image capturing facility and requirements of an ID and
there is no need of hand written ID card. QR code is attached into ID card and personal details
can be found by scanning the QR code with QR IDENTITY Application in your Computer. QR
code is said to be the next generation of bar code and using QR code with ID card brought
positive outcomes. While using software tools, identity cards works fine and suitable for an
educational institution as it is free. Thus, ID card will be a perfect use of modern technology in
developing countries.
BACKGROUND OF STUDY:
Nowadays, with the rapid growth of population, people need to be identified and it is now
a must for any organization, educational institution and company to make use of the Identity
card (ID).
students, faculties or employees. It is highly essential for an educational institute and company to
provide ID card to each and every student/faculty. The card is generally considered to be the
summary of a student, faculty and employees information. The project Advanced QR coded ID
Card Generation is being created to lessen their effort as we all know people before use the hand
written ID card. The ID is the pure automated solution and it will help to generate the student,
faculty and employees ID card easily. It is a special type of software which will be used to make
an advance ID card with QR code instead of the bar code. Our ID card produce software that
captures the students, faculties and employees picture and QR Code. For instance, business card
does have only QR code facility and will add all the features in one ID card. This software will
act as a smart ID card. Another important point is, it can find an open source which means it will
be available for free. QR code can be scanned with any QR IDENTITY application in your
computer and it will show all the information of the students, faculties and staff.
Students nowadays dont appreciate the main purpose of their identification cards that
leads to unsecure environment inside or outside the school.
Students find the process in getting their statement of accounts that is time consuming in
long cue in line just to know their payment status.
There is no alternative way to secure the information of every students, faculties and staff
of the institute.
The lack of security of in and out process inside the institute.
OBJECTIVES:
General Objective:
To develop a QR ID VERIFICATION CODE SYSTEM that will insure the safety
of valuable information and data of every students, faculties, staff and guest in the
institution.
Specific Objectives:
To develop an application that will provide an online checking of grade results, fees,
reader or the
Sema Code.The code can easily give all the information of the holder through the
application in the computer wherein such as the student can check his/her information such as
tuitions fees, grades, and the class schedule, medical records. The students can use their IDs as
a pass to enter the school premises. The admininistration can easily monitors the entry of
every personalities in that specific time and date. This QR ID also applies to all visitors of the
school as a reference of their entry and purpose.
Employees
For the Employees this will serve as their secondary time cards and
keeping their data.
Students
For the students
will
serve
as
their
security
for
their
Future researchers
The future researchers are the proponents that can make use of this research as
their reference for their project.
Conceptual Framework:
INPUT
ID NUMBER
QR ID VERIFICATION CODE
System
Generate ID
Daily time record
monitoring
Report of grades
Students data recovery
Reports of time in and time
out
Add students data
OUTPUT
EASY TO USE
Provides Privacy
Secures every data of the
user
Gives accurate report of
grades
Gives accurate report of time
in and out monitoring
SUCURITY
FLEXIBILITY
The diagram shows the relationship between the input and output process of the proposed
system. qr id verification code System, is a windows application that enables the user to use their
ID as a gate pass in the school. The user can access the qr id verification code System by the use
of their ID numbers, the system uses a ID number regarding of the user access for the user types
the admin can access the control panel of the system their they can add a data of a students,
faculties, staff and guests.
For none admin their access is limited such as the student they can only access their data
print their grades and schedules and view the status of their tuition fees. For the teachers their ID
will serve as an alternative time card and their schedules and show the status of their students
ADVANTAGE:
A QR code can carry up to some hundred times the amount of information a conventional
barcode is capable of. When comparing the display of both: a conventional barcode can take up
to ten times the amount of printing space as a QR code carrying the same amount of information.
A QR code is capable of being read in 360 degrees, from any direction, thus eliminating any
interference and negative effects from backgrounds.
DISADVANTAGE:
One disadvantage of QR codes and perhaps the biggest problem is the lack of familiarity
of the QR code among people. Although QR codes are popping up everywhere from on plant
specimen labels to library catalogues, there is a large demographic in society that still dont
know what QR codes represent.
SOLVING ISSUES:
8
SECURITY:
The management, students and employees are secured when they were using QR ID
VERIFICATION CODE SYSTEM because it prevents people to enter the premises without
authority.
CHAPTER II
Review of Related Studies and Literature
Media:
An
Empirical
Data
Research
Anthology
from
10
(QR) codes in print media. To enhance and build on the findings collected from
outside research, a survey was administered solely for the purposes of this study
at the University of Wisconsin La Crosse to uncover QR code awareness and
effectiveness, as previous research is continuing to find that QR codes are still
facing adoption issues due to technology and content hindrances. Because of their
interactive capabilities, QR codes have infiltrated several types of print media in a
short amount of time, but are QR codes just todays passing fad or a global shift in
mobile marketing?
The
2-dimensional
11
12
Response code is a two-dimensional matrix code that has can hold data. It has a
larger set of machine readable codes as compared to the 1-dimensional barcode
and it can hold more data because it uses both the horizontal and vertical axis. It is
widely used in different fields such as manufacturing and mobile marketing. QR
codes has a more advanced error correction and it is more reliable and has a faster
speed than other codes. 1d codes were improved in such a way that they can hold
more information but this resulted to adding more bars/lines to the barcode and
resulted to a barcode that has a larger area, and become more complicated to read
by scanners. Due to this, demand grew for a code that can hold more information
in the least space. 2 dimensional codes like the QR code which can hold more
information than the traditional 1d code were produced. In this way, the QR code
gained popularity and became widely accepted and used. The problem with the
large barcode area was solved by placing information on both vertical and
horizontal parts of the code. This resulted to an area that has more data density
and a smaller area space.
According to the reference Identity Verification and Entry Control System with
Counter
Data
Center
College
of
the
Philippines,
Laoag
City
13
database, generate barcode and generate a summary of individuals that are in the
school premises.Also with these applications, using the computers architecture,
it enables the system to communicate to other devices in getting input data and
acquiring signal outputs. Each student and employee of the school will be issued
an identification card with barcode that will be swiped and read by a barcode
scanner and a PIN code that will deeply identify their authenticity in order for
them to pass through the turnstile. Upon entering and leaving the school
premises the counters will increment. The device was composed of two counters
namely, entry counters and exit counter, this counter will increment when the
turnstile sensors are being triggered. A student or employee will scan his or her
bar-coded ID through the scanner to unlock the turnstile first before he or she can
enter the building and this will allow triggering the sensor and then the counter is
increased.
14
15
16
purpose in our project, the matching results are so good that it could perform very
well on large databases like that of a country like India (MNIC Project).
Development of Attendance Management System using Biometrics Department of
Electronic and Computer Engineering, Lagos State University, Epe Campus,
Nigeria In this paper, the development of an attendance management system using
biometrics is proposed. Managing student attendance during lecture periods has
become a difficult challenge. The ability to compute the attendance percentage
becomes a major task as manual computation produces errors, and also wastes a
lot of time. For the stated reason, an efficient attendance management system
using biometrics is designed. This system takes attendance electronically with the
help of a finger print device and the records of the attendance are stored in a
database. Attendance is marked after student identification. For student
identification, a biometric(fingerprint) identification based system is used. This
process however, eliminates the need for stationary materials and personnel for
the keeping of records. Eighty candidates were used to test the system and success
rate of 94% was recorded. The manual attendance system average execution time
for eighty students was 17.83 seconds while it was 3.79 seconds for the automatic
attendance management system using biometrics. The results showed improved
performance over manual attendance management system. Attendance is marked
after student identification attendance in class. In developing countries, a
minimum percentage of class attendance is required in most institutions and this
policy has not been adhered to, because of the various challenges the present
method of taking attendance presents. This traditional method involves the use of
17
sheets of paper or books in taking student attendance. This method could easily
allow for impersonation and the attendance sheet could be stolen or lost. Taking
of attendance is time consuming and it is difficult to ascertain the number of
students that have made the minimum percentage and thus eligible for exam.
Thus, there is a need for a system that would eliminate all of these trouble spots.
An automatic attendance management system using biometrics would provide the
needed solution. An attendance management system is software developed for
daily student attendance in schools and institutions. It facilitates access to the
attendance of a particular student in a particular class. This system will also help
in generating reports and evaluating the attendance eligibility of a student.Rather
than signing an attendance sheet, individuals will pass their thumb over the
fingerprint scanner, the finger print is compared against a list of pre-registered
users, and once a match is made, the individual will be registered as having
attended that lecture. The paper discusses related works in the problem domain;
highlights the general overview of the proposed system; details design
considerations of the system, both at the hardware and software level; discusses
the operation and how the system was tested in conformity to system design and
functional
objectives;
concludes
the
18
observations
made;
and
makes
19
pass through the RFID reader to identify their information and saved
the record of their arrival and departure to the database. SMS or Email
notification is used for notification sent to the parents for complacency
purpose .The application graphical user interface (GUI) will perform
automated attendance and would generate report of the presence of
each student inside the school premise. . RFID technology will be the
main object of the study. RFID tags must be worn by the students and
they will just tap the ID 5 through the RFID reader to identify their
information. SMS or Email notification is used for notification sent to
the parents for complacency purpose. The proposed project will work in
a computer with Microsoft Windows XP Professional or any upgraded
OS, with at least 1.6GHz or faster processor that can run the system at
ease period of time and running at 1024 x 768 or higher-resolution
display, and must meet all the given hardware and software
specification. The study will cater a one class, 20-30 number of
students to have a trial on attendance monitoring using RFID
technology. Guards will monitor the ins and outs of every student,
Registration office is in charge of the main functionalities of the
system, gathering of data and information from the students and
professors. Professors of different subjects and advisory class are also
involved by monitoring the students via wireless local area network.
The last chapter of this paper discussed the setting of the study, its
population and environment where we conducted some tests to
identify the functionality and the usability of the proposed system. It
also shows the improvements that we applied to the project by
20
showing the output and the result of this project if it will be effective or
not. Some staff recommends it will be much convenient if we put
online attendance viewing so it will be easy for them to go to the
website and to download the daily attendance report.
Project Methodology
The team will use the Rapid Application Development (RAD) model as a guide in
developing the system. The system is designed to integrate the application that gives security to
every data of the students, faculties, staff and gives privacy to the users. It includes how the team
will create the system. The figure below illustrates the process in making the system.
21
PLANNING
22
and hard methodologies that includes: interviews, questionnaires, document analysis, and
observation of the users.
Analysis: The System Analyst and Documentarian of the project team will be analyzing the
evaluation of data gathering in survey or interview. The project team should be very careful in
evaluating and recording the gathered information because it will have a great effect in the
succeeding stage of the project team. The project team will also start internet surfing, to gather
information for the definition of terms and conduct research in different school library for the
related literature and studies.
Design: This is the stage of developing the interface of the system. This interface will be
developed by the system analyst and must meet the requirements of the system. The system
analyst must design a system in order for the programmer to start coding the system.
Build/Coding: This is the stage of coding according to the system design by the system analyst.
This is done by the team programmer. The coding of the system must work successfully and
meet the requirements of the system. The project team must consult the system adviser for the
improvement of the of the system. This is also the process to develop the documents for chapter
IV V.
Testing: In this stage the programmer and the system analyst must check if the system is already
working. The project team must show the system developed for the system adviser and device in
the progress of the system. In the conduct of the client testing, the system developed must work
properly and free from errors and achieve success.
Support and Maintenance: This is the final stage where the developed system is required
working and must contain all the needed requirements of the user and the system. The system
23
must be free from error and must have a high percentage n client testing. This includes the
installing of the system. The project team must maintain that the system works.
24